Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Machine Learning (3)
- Computing (2)
- Algorithm (1)
- Algorithmic Composition (1)
- Algorithms (1)
-
- Apple (1)
- Autonomous Vehicles (AV) (1)
- Blind (1)
- Blockchain (1)
- Camera (1)
- Coding (1)
- Coding Vulnerabilities (1)
- Computational thinking (1)
- Computer Vision (1)
- Computer algorithms; Machine learning; Artificial intelligence; Neural networks (Computer science); Computer music (1)
- Computer science (1)
- Conditional Variational Autoencoder (1)
- CoreML (1)
- Cybersecurity (1)
- Dance (1)
- Data Augmentation (1)
- Data science (1)
- Generative AI (1)
- IBeacon (1)
- IOS (1)
- Imputation (1)
- K-Nearest Neighbor (kNN) (1)
- Machine learning; Computer algorithm; Neural architecture search (1)
- Machine learning; Database management; Computer vision; Conditional Variational Autoencoder; Data augmentation (1)
- Mental health services (1)
Articles 1 - 14 of 14
Full-Text Articles in Engineering
The Effects Of Virtual Reality On Mental Health Software User Satisfaction And Retention, William Hooten
The Effects Of Virtual Reality On Mental Health Software User Satisfaction And Retention, William Hooten
Honors Theses
Mental health issues have become increasingly important in today's society. With that being said, researchers and consumers are looking for new ways to manage and treat mental health using new technologies in labs and the consumer space. This innovation has led to the presence of mobile self-help mental health applications, applications for peoples’ phones that are used to manage symptoms of mental health problems, such as depression and anxiety, track goals, meditate, and more. However, mobile mental health applications, and mobile applications in general, have a problem concerning user satisfaction and overall user retention – studies have shown that 95% …
Examining The Wording Of Digital Synthesizer Presets To Help Novice Producers, Nicholas O'Toole
Examining The Wording Of Digital Synthesizer Presets To Help Novice Producers, Nicholas O'Toole
Honors Theses
My research looks into the use of ”presets” in digital synthesizers, which alter the timbre (quality) of the synthesizer’s sound by loading in pre-selected configurations of settings. My study compares imagery- based and feelings-based preset names – for example, Cloud City Keys and Mellow lead, respectively – in an attempt to see which better predicts the sound it represents. Through my results, I will then explain how the wording of these preset names affected my subjects’ perception of certain sounds. The results I found lead me to believe that imagery-based preset names could be representative of their respective presets’ sounds.
An Ios Application For Visually Impaired Individuals To Assist With Crossing Roads, Ali Khan
An Ios Application For Visually Impaired Individuals To Assist With Crossing Roads, Ali Khan
Honors Theses
In day-to-day life, visually impaired individuals face the problem of crossing roads by themselves. This project was designed and built to solve this key issue. The system is supposed to give the user a warning before approaching a crosswalk for their safety and also give information about when it is safe to cross the road. An iOS application was developed to address the problem since recent studies have discovered that a vast number of visually impaired individuals are using smartphones (iPhones in particular) due to the ease and convenience it brings to their daily life. The application should be able …
Investigation Of Python Variable Privacy, Joshua Bartholomew
Investigation Of Python Variable Privacy, Joshua Bartholomew
Honors Theses
This study looks at the relative security of Python regarding private variables and functions used in most other programming languages. Python has only grown in popularity due to its simple syntax and developing capabilities. However, little research has been published about how secure Python code and programs compiled from Python code actually are. This research seeks to expose vulnerabilities in Python code and determine what must be done for these vulnerabilities to be exploited by hackers to abuse potentially sensitive information contained within the program.
The proposed methodology includes examining the private variable concept in other programming languages and conducting …
Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen
Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen
Honors Theses
This project involves comparing different methods of missing data imputation in the context of predicting real estate listing prices. These methods are compared against each other in both their ability to recreate the original data and their effects on a final predictive model. In order to evaluate their effectiveness, first, a predictive model is made using the complete dataset to use as a benchmark for the imputed datasets. Then, a complete dataset is split into 80% training and 20% testing datasets, and missing values are created in the training data using two different missing data mechanisms, missing completely at random …
Privacy-Preserving Blockchain-Based Registration Scheme For Av Parking System, Alexander Haastrup
Privacy-Preserving Blockchain-Based Registration Scheme For Av Parking System, Alexander Haastrup
Honors Theses
Autonomous Vehicles (AV) are a prime example of how innovation and automation are at the forefront of growing technology trends. The concern of parking systems is becoming apparent as research into ways to increase the efficiency and cost-effectiveness of AV continues. To ward against various internet attackers and secure users' sensitive information, an efficient AV parking system must have powerful user privacy and cyber security capabilities. In my work, I present a blockchain-based privacy registration system for AV parking systems that meets the following criteria. The proposed scheme incorporates k-Nearest Neighbor (kNN) - an efficient and lightweight algorithm - for …
Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha
Self-Efficacy Development In Elementary-Aged Learners Through Dance As An Algorithmic Thinking Tool, Niva Shrestha
Honors Theses
The purpose of this research is to demonstrate the effectiveness of a transdisciplinary approach in teaching computational thinking through dance to elementary-aged learners, with primary attention to females. With limited literature available on how pre-adolescents begin to construct conceptions of computer science and other engineering domains, including potential career pathways, the incentive of this project was to leverage a day camp for about 20 rising 3rd - 5th-grade learners to assess their identity development in computer science. Modules that teach computational thinking through dance paired with Unruly splats (block-based programmable electronic gadgets) were implemented. By conducting pre-and post-surveys and a …
Computational Analysis Of The Synthesis Of Hydrogels Using The Diels Alder Reaction, Avery Boley
Computational Analysis Of The Synthesis Of Hydrogels Using The Diels Alder Reaction, Avery Boley
Honors Theses
No abstract provided.
Art To Influence Creativity In Algorithmic Composition, Tyler Braithwaite
Art To Influence Creativity In Algorithmic Composition, Tyler Braithwaite
Honors Theses
Advances in Recurrent Neural Network (RNN) techniques have caused an explosion of problems posed that revolve around the mass analysis and generation of sequential data, including symbolic music. Building off the work of Nathaniel Patterson’s Musical Autocomplete: An LSTM Approach, we extend this problem of continuing a composition by examining the creative impact that injecting latent-space encoded image data, specifically fine art from the WikiArt Dataset, has on the musical output of RNN architectures designed for autocomplete. For comparison purposes with Patterson, we will also be using a corpus of Erik Satie’s piano music for training, validation, and testing.
Ux/U-Eye: Designing Graphical User Interfaces For Exclusive Eye Gaze Control, Timothy Curol
Ux/U-Eye: Designing Graphical User Interfaces For Exclusive Eye Gaze Control, Timothy Curol
Honors Theses
No abstract provided.
Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines
Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines
Honors Theses
No abstract provided.
Conditional Variational Autoencoder (Cvae) For The Augmentation Of Ecl Biosensor Data, Matthew Dulcich
Conditional Variational Autoencoder (Cvae) For The Augmentation Of Ecl Biosensor Data, Matthew Dulcich
Honors Theses
Machine Learning (ML) is vastly improving the world, from computer vision to fully self-driving cars, we are now able accomplish objectives that were thought to only be dreams. In order to train ML models accurately, they require mountains of information to work with, but sometimes it becomes impossible to collect the data needed, so we turn to data augmentation. In this project we use a conditional variational auto encoder to supplement the original video electrochemiluminescence biosensor dataset, in order to increase the accuracy of a future classification model. In other words, using a cVAE we will create unique realistic videos …
Exploring The Efficiency Of Neural Architecture Search (Nas) Modules, Joshua Dulcich
Exploring The Efficiency Of Neural Architecture Search (Nas) Modules, Joshua Dulcich
Honors Theses
Machine learning is obscure and expensive to develop. Neural architecture search (NAS) algorithms automate this process by learning to create premier ML networks, minimizing the bias and necessity of human experts. From this recently emerging field, most research has focused on optimizing a promisingly unique combination of NAS’s three segments. Despite regularly acquiring state of the art results, this practice sacrifices computing time and resources for slight increases in accuracy; this also obstructs performance comparison across papers. To resolve this issue, we use NASLib’s modular library to test the efficiency per module in a unique subset of combinations. Each NAS …
90snet:, Seth Richard